Movatterモバイル変換


[0]ホーム

URL:


US20250045434A1 - Secure contact tracing between computing devices - Google Patents

Secure contact tracing between computing devices
Download PDF

Info

Publication number
US20250045434A1
US20250045434A1US18/362,244US202318362244AUS2025045434A1US 20250045434 A1US20250045434 A1US 20250045434A1US 202318362244 AUS202318362244 AUS 202318362244AUS 2025045434 A1US2025045434 A1US 2025045434A1
Authority
US
United States
Prior art keywords
user
vertex
processors
geohash
graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/362,244
Inventor
Xiang Zhen Gan
Hai Hui Wang
Guangya Liu
Peng Li
Ying Mo
Natalie Brooks Powell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US18/362,244priorityCriticalpatent/US20250045434A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BROOKS POWELL, NATALIE, WANG, HAI HUI, GAN, XIANG ZHEN, LIU, PENG, LIU, Guangya, MO, Ying
Publication of US20250045434A1publicationCriticalpatent/US20250045434A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Computer implemented methods, systems, and computer program products include program code executing on a processor(s) that obtains location data from a client (an encrypted and a timestamp comprising). The processor(s) stores, in a graphing database, a vertex representing the user in a graph. The processor(s) determines, based on comparing the encrypted geohash and the timestamp of the vertex to values in one or more vertices in the graph, that at least one additional user intersected with the user in physical space proximate to a given time. The processor(s) generates or updates, between the vertex of the user and the at least one vertex representing the at least one additional user, an edge in the graph to represents a direct contact between. The processor(s) applies, to the graph, a breath first search algorithm to the graph to identify one or more indirect contacts between users.

Description

Claims (20)

What is claimed is:
1. A computer-implemented method for contact tracing, the method comprising:
obtaining, by one or more processors, location data from a client, wherein the location data comprises an identifier of a user utilizing the client, an encrypted geohash representing a physical location of the client at the obtaining, and a timestamp comprising a time of the obtaining;
storing, by the one or more processors, in a graphing database communicatively coupled to the one or more processors, a vertex representing the user, in a graph, wherein properties of the vertex comprise the location data;
determining, by the one or more processors, based on comparing the encrypted geohash and the timestamp of the vertex to values in one or more vertices in the graph, wherein each vertex of the one or more vertices represents an additional user, that at least one additional user intersected with the user in physical space proximate to a given time, wherein an encrypted geohash of at least one vertex representing the at least one additional user matches the encrypted geohash of the client and a timestamp of the at least one vertex representing the at least one additional user is within a predetermined interval of the timestamp of the client;
generating or updating, by the one or more processors, between the vertex of the user and the at least one vertex representing the at least one additional user, an edge in the graph, wherein the edge represents a direct contact between the user and the at least one additional user; and
applying, by the one or more processors, to the graph, a breath first search algorithm to the graph to identify one or more indirect contacts between users represented as vertices in the graph including indirect contacts between the user and other users represented as vertices.
2. The method ofclaim 1, wherein obtaining the encrypted geohash comprises:
obtaining, by the one or more processors, a geohash representing the physical location of the client; and
encrypting, by the one or more processors, the geohash to generate the encrypted geohash, wherein a portion of the encrypted geohash is plain text.
3. The method ofclaim 2, wherein the encrypting comprises applying a message-digest hashing algorithm to the geohash.
4. The method ofclaim 1, wherein the storing the location data in the database comprises:
verifying, by the one or more processors, that three pre-conditions related to the location data have been met; and
based on the verifying, proceeding, by the one or more processors, with the storing.
5. The method ofclaim 4, wherein the preconditions comprise: the encryption geohash of the client differs from earlier obtained encryption geohashes from the client, a set interval of time has elapsed between the obtaining from a last time of obtaining location data from the client, and at the obtaining at least one additional device was within a pre-defined vicinity of the client.
6. The method ofclaim 1, wherein the generating or the updating the edge comprises:
determining, by the one or more processors, based on the determining that the at least one additional user intersected with the user in the physical space proximate to the given time, if the graph comprises the edge between the vertex and the at least one vertex;
based on determining that the graph does not comprise the edge, generating the edge with a label representing a date of the intersection; and
based on determining that the graph comprises the edge, updating the label of the edge with the date of the intersection.
7. The method ofclaim 1, wherein the storing the vertex comprises:
determining, by the one or more processors, if the vertex representing the user exists in the graph;
based on determining that the vertex does not exist, implementing, by the one or more processors, the vertex; and
based on determining that the vertex exists, updating, by the one or more processors, the properties of the vertex with the location data.
8. The method ofclaim 1, wherein the graphing database is partitioned, wherein each partition of the graphing database comprises location data from a zone representing a geographic region, wherein the location data from the client comprises a value representing a given zone, and wherein the storing comprises storing the vertex representing the user in a partition of the graphing database comprising data from the given zone.
9. The method ofclaim 8, wherein the determining that the at least one additional user intersected with the user in the physical space proximate to the given time comprises:
identifying, by the one or more processors, in the graphing database, the partition of the graphing database comprising the data from the given zone; and
querying, by the one or more processors, vertices in the partition of the graphing database, with query parameters comprising the encrypted geohash and the timestamp of the vertex to determine the one additional user.
10. The method ofclaim 8, wherein the determining that the at least one additional user intersected with the user in the physical space proximate to the given time comprises:
identifying, by the one or more processors, in the graphing database, the partition of the graphing database comprising the data from the given zone; and
querying, by the one or more processors, vertices in the partition of the graphing database and in partitions representing geographic regions within a given physical distance of the given zone, with query parameters comprising the encrypted geohash and the timestamp of the vertex to determine the one additional user.
11. The method ofclaim 1, further comprising:
determining, by the one or more processors, based on properties of vertices in the graph, if any users in the direct contact and the indirect contacts are infected with an infectious disease; and
transmitting, by the one or more processors, an alert to the direct contact and the indirect contacts if one or more user in each contact of the direct contact and the indirect contact is infected.
12. The method ofclaim 1, further comprising
continuously purging, by the one or more processors, stale data in the graph, wherein the stale data comprises data with a timestamp a pre-determined amount of time before a current time.
13. The method ofclaim 1, wherein the properties of the vertex comprise the timestamp, wherein storing the timestamp comprises eliminating seconds in the timestamp in advance of the storing.
14. A computer system for contact tracing, the computer system comprising:
a memory; and
one or more processors in communication with the memory, wherein the computer system is configured to perform a method, said method comprising:
obtaining, by the one or more processors, location data from a client, wherein the location data comprises an identifier of a user utilizing the client, an encrypted geohash representing a physical location of the client at the obtaining, and a timestamp comprising a time of the obtaining;
storing, by the one or more processors, in a graphing database communicatively coupled to the one or more processors, a vertex representing the user, in a graph, wherein properties of the vertex comprise the location data;
determining, by the one or more processors, based on comparing the encrypted geohash and the timestamp of the vertex to values in one or more vertices in the graph, wherein each vertex of the one or more vertices represents an additional user, that at least one additional user intersected with the user in physical space proximate to a given time, wherein an encrypted geohash of at least one vertex representing the at least one additional user matches the encrypted geohash of the client and a timestamp of the at least one vertex representing the at least one additional user is within a predetermined interval of the timestamp of the client;
generating or updating, by the one or more processors, between the vertex of the user and the at least one vertex representing the at least one additional user, an edge in the graph, wherein the edge represents a direct contact between the user and the at least one additional user; and
applying, by the one or more processors, to the graph, a breath first search algorithm to the graph to identify one or more indirect contacts between users represented as vertices in the graph including indirect contacts between the user and other users represented as vertices.
15. The system ofclaim 14, wherein obtaining the encrypted geohash comprises:
obtaining, by the one or more processors, a geohash representing the physical location of the client; and
encrypting, by the one or more processors, the geohash to generate the encrypted geohash, wherein a portion of the encrypted geohash is plain text.
16. The system ofclaim 15, wherein the encrypting comprises applying a message-digest hashing algorithm to the geohash.
17. The system ofclaim 14, wherein the storing the location data in the database comprises:
verifying, by the one or more processors, that three pre-conditions related to the location data have been met; and
based on the verifying, proceeding, by the one or more processors, with the storing.
18. The system ofclaim 17, wherein the preconditions comprise: the encryption geohash of the client differs from earlier obtained encryption geohashes from the client, a set interval of time has elapsed between the obtaining from a last time of obtaining location data from the client, and at the obtaining at least one additional device was within a pre-defined vicinity of the client.
19. The system ofclaim 14, wherein the generating or the updating the edge comprises:
determining, by the one or more processors, based on the determining that the at least one additional user intersected with the user in the physical space proximate to the given time, if the graph comprises the edge between the vertex and the at least one vertex;
based on determining that the graph does not comprise the edge, generating the edge with a label representing a date of the intersection; and
based on determining that the graph comprises the edge, updating the label of the edge with the date of the intersection.
20. A computer program product for identifying key emotional content in a text, the computer program product comprising:
one or more computer readable storage media and program instructions collectively stored on the one or more computer readable storage media readable by at least one processing circuit to:
obtain, by the one or more processors, location data from a client, wherein the location data comprises an identifier of a user utilizing the client, an encrypted geohash representing a physical location of the client at the obtaining, and a timestamp comprising a time of the obtaining;
store, by the one or more processors, in a graphing database communicatively coupled to the one or more processors, a vertex representing the user, in a graph, wherein properties of the vertex comprise the location data;
determine, by the one or more processors, based on comparing the encrypted geohash and the timestamp of the vertex to values in one or more vertices in the graph, wherein each vertex of the one or more vertices represents an additional user, that at least one additional user intersected with the user in physical space proximate to a given time, wherein an encrypted geohash of at least one vertex representing the at least one additional user matches the encrypted geohash of the client and a timestamp of the at least one vertex representing the at least one additional user is within a predetermined interval of the timestamp of the client;
generate or update, by the one or more processors, between the vertex of the user and the at least one vertex representing the at least one additional user, an edge in the graph, wherein the edge represents a direct contact between the user and the at least one additional user; and
apply, by the one or more processors, to the graph, a breath first search algorithm to the graph to identify one or more indirect contacts between users represented as vertices in the graph including indirect contacts between the user and other users represented as vertices.
US18/362,2442023-07-312023-07-31Secure contact tracing between computing devicesPendingUS20250045434A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US18/362,244US20250045434A1 (en)2023-07-312023-07-31Secure contact tracing between computing devices

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US18/362,244US20250045434A1 (en)2023-07-312023-07-31Secure contact tracing between computing devices

Publications (1)

Publication NumberPublication Date
US20250045434A1true US20250045434A1 (en)2025-02-06

Family

ID=94387491

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US18/362,244PendingUS20250045434A1 (en)2023-07-312023-07-31Secure contact tracing between computing devices

Country Status (1)

CountryLink
US (1)US20250045434A1 (en)

Citations (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2000322514A (en)*1999-05-142000-11-24Fujitsu Ltd Pattern extraction device and character segmentation device
US7617531B1 (en)*2004-02-182009-11-10Citrix Systems, Inc.Inferencing data types of message components
US20100125569A1 (en)*2008-11-182010-05-20Yahoo! Inc.System and method for autohyperlinking and navigation in url based context queries
US20120191724A1 (en)*2011-01-262012-07-26Tucek Joseph AStorage of data objects based on a time of creation
US20140324582A1 (en)*2013-04-302014-10-30Google Inc.Social network enhanced content items responsive to search queries
CN105912562A (en)*2016-03-212016-08-31华南理工大学Data visualization method and data visualization system based on hierarchical model
US20170300657A1 (en)*2016-04-142017-10-19Virginia Polytechnic Institute And State UniversityComputerized Event Simulation Using Synthetic Populations
US20180316900A1 (en)*2012-10-172018-11-01Facebook, Inc.Continuous Capture with Augmented Reality
CN108737323A (en)*2017-04-132018-11-02山东量子科学技术研究院有限公司A kind of digital signature method, apparatus and system
US20190251123A1 (en)*2018-02-132019-08-15Fujitsu LimitedApparatus, method and program for shortest path matrix generation
US20190386969A1 (en)*2015-01-262019-12-19Listat Ltd.Decentralized Cybersecure Privacy Network For Cloud Communication, Computing And Global e-Commerce
CN110602230A (en)*2019-09-202019-12-20重庆洲雄科技有限责任公司Case information forwarding method for case reporter and related equipment
CN111127230A (en)*2018-10-312020-05-08百度在线网络技术(北京)有限公司Dynamic social circle determination method, device, equipment and storage medium
CN111737538A (en)*2020-06-112020-10-02浙江邦盛科技有限公司Reverse real-time matching method for graph mode based on event driving
US20210168152A1 (en)*2019-12-032021-06-03Blackberry LimitedSystems and methods for managing mobile devices based on device location data
US20210232377A1 (en)*2020-01-282021-07-29Oracle International CorporationEncoding dependencies in call graphs
CN113470833A (en)*2021-05-252021-10-01浙江大华技术股份有限公司Person tracking method, person tracking device, electronic device, and storage medium
CN113672690A (en)*2021-08-242021-11-19卡斯柯信号有限公司Traversal method of track section
CN113891369A (en)*2021-10-292022-01-04中国联合网络通信集团有限公司 A network optimization method, device and storage medium
US20220067738A1 (en)*2020-08-282022-03-03Anchain.ai Inc.System and Method for Blockchain Automatic Tracing of Money Flow Using Artificial Intelligence
US20220092179A1 (en)*2021-12-022022-03-24Intel CorporationDetecting data oriented attacks using hardware-based data flow anomaly detection
KR102399702B1 (en)*2020-03-302022-05-19주식회사 올라운드Trace system for Infectious people and trace method using it
CN114639487A (en)*2022-03-032022-06-17北京九栖科技有限责任公司 Epidemic spread model construction method, terminal and storage medium
US20220351523A1 (en)*2020-01-092022-11-03Seadronix Corp.Method and device for monitoring port and ship in consideration of sea level
US20220383349A1 (en)*2020-02-182022-12-01Grabtaxi Holdings Pte. Ltd.System and method for partitioning geographical areas into logistical areas for dynamic pricing
US20230268038A1 (en)*2020-07-132023-08-24Medyear, Inc., (formerly Known As: Personiform Inc., dba Medyear)Proximity-based file sharing system and method
US20230280477A1 (en)*2020-04-102023-09-07Rohit SethSystem for Calculating Highly Accurate GPS Location for Mobile Devices
US20230289460A1 (en)*2020-07-202023-09-14Sri InternationalSensitive dataflow tracking system and method
US20240388592A1 (en)*2023-05-172024-11-21Bank Of America CorporationIntelligent Hybrid Cloud Orchestration Engine leveraging 3 Layered Secured Data Gateway

Patent Citations (31)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2000322514A (en)*1999-05-142000-11-24Fujitsu Ltd Pattern extraction device and character segmentation device
JP3798179B2 (en)*1999-05-142006-07-19富士通株式会社 Pattern extraction device and character segmentation device
US7617531B1 (en)*2004-02-182009-11-10Citrix Systems, Inc.Inferencing data types of message components
US20100125569A1 (en)*2008-11-182010-05-20Yahoo! Inc.System and method for autohyperlinking and navigation in url based context queries
US20120191724A1 (en)*2011-01-262012-07-26Tucek Joseph AStorage of data objects based on a time of creation
US20180316900A1 (en)*2012-10-172018-11-01Facebook, Inc.Continuous Capture with Augmented Reality
CN105339968A (en)*2013-04-302016-02-17谷歌公司Social network enhanced content items responsive to search queries
US20140324582A1 (en)*2013-04-302014-10-30Google Inc.Social network enhanced content items responsive to search queries
US20190386969A1 (en)*2015-01-262019-12-19Listat Ltd.Decentralized Cybersecure Privacy Network For Cloud Communication, Computing And Global e-Commerce
CN105912562A (en)*2016-03-212016-08-31华南理工大学Data visualization method and data visualization system based on hierarchical model
US20170300657A1 (en)*2016-04-142017-10-19Virginia Polytechnic Institute And State UniversityComputerized Event Simulation Using Synthetic Populations
CN108737323A (en)*2017-04-132018-11-02山东量子科学技术研究院有限公司A kind of digital signature method, apparatus and system
US20190251123A1 (en)*2018-02-132019-08-15Fujitsu LimitedApparatus, method and program for shortest path matrix generation
CN111127230A (en)*2018-10-312020-05-08百度在线网络技术(北京)有限公司Dynamic social circle determination method, device, equipment and storage medium
CN110602230A (en)*2019-09-202019-12-20重庆洲雄科技有限责任公司Case information forwarding method for case reporter and related equipment
US20210168152A1 (en)*2019-12-032021-06-03Blackberry LimitedSystems and methods for managing mobile devices based on device location data
US20220351523A1 (en)*2020-01-092022-11-03Seadronix Corp.Method and device for monitoring port and ship in consideration of sea level
US20210232377A1 (en)*2020-01-282021-07-29Oracle International CorporationEncoding dependencies in call graphs
US20220383349A1 (en)*2020-02-182022-12-01Grabtaxi Holdings Pte. Ltd.System and method for partitioning geographical areas into logistical areas for dynamic pricing
KR102399702B1 (en)*2020-03-302022-05-19주식회사 올라운드Trace system for Infectious people and trace method using it
US20230280477A1 (en)*2020-04-102023-09-07Rohit SethSystem for Calculating Highly Accurate GPS Location for Mobile Devices
CN111737538A (en)*2020-06-112020-10-02浙江邦盛科技有限公司Reverse real-time matching method for graph mode based on event driving
US20230268038A1 (en)*2020-07-132023-08-24Medyear, Inc., (formerly Known As: Personiform Inc., dba Medyear)Proximity-based file sharing system and method
US20230289460A1 (en)*2020-07-202023-09-14Sri InternationalSensitive dataflow tracking system and method
US20220067738A1 (en)*2020-08-282022-03-03Anchain.ai Inc.System and Method for Blockchain Automatic Tracing of Money Flow Using Artificial Intelligence
CN113470833A (en)*2021-05-252021-10-01浙江大华技术股份有限公司Person tracking method, person tracking device, electronic device, and storage medium
CN113672690A (en)*2021-08-242021-11-19卡斯柯信号有限公司Traversal method of track section
CN113891369A (en)*2021-10-292022-01-04中国联合网络通信集团有限公司 A network optimization method, device and storage medium
US20220092179A1 (en)*2021-12-022022-03-24Intel CorporationDetecting data oriented attacks using hardware-based data flow anomaly detection
CN114639487A (en)*2022-03-032022-06-17北京九栖科技有限责任公司 Epidemic spread model construction method, terminal and storage medium
US20240388592A1 (en)*2023-05-172024-11-21Bank Of America CorporationIntelligent Hybrid Cloud Orchestration Engine leveraging 3 Layered Secured Data Gateway

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Moussalli, Roger, Mudhakar Srivatsa, and Sameh Asaad. "Fast and flexible conversion of geohash codes to and from latitude/longitude coordinates." In 2015 IEEE 23rd annual international symposium on field-programmable custom computing machines, pp. 179-186. IEEE, 2015. (Year: 2015)*
TU Guoqing, YANG Yanhao, LIU Shubo. Vulnerability Analysis of Geohash Code Against k-nearest Neighbor Attack. Netinfo Security[J], 2021, 21(2): 10-15doi:10.3969/j.issn.1671-1122.2021.02.002 (Year: 2021)*

Similar Documents

PublicationPublication DateTitle
Xu et al.Distilling at the edge: A local differential privacy obfuscation framework for IoT data analytics
Dai et al.Personalized semantic trajectory privacy preservation through trajectory reconstruction
US20160105801A1 (en)Geo-based analysis for detecting abnormal logins
Mouratidis et al.Shortest path computation with no information leakage
Li et al.Blockchain and IoT data analytics for fine-grained transportation insurance
US20230259654A1 (en)Privacy-preserving computing on subject data used to develop artificial intelligence tools
Boutsis et al.Location privacy for crowdsourcing applications
Foschini et al.Edge-enabled mobile crowdsensing to support effective rewarding for data collection in pandemic events
CN107969154A (en)Privacy management
US20220068499A1 (en)Predicting infection risk using heterogeneous temporal graphs
BakhshiForensic of things: Revisiting digital forensic investigations in internet of things
Koo et al.Fine-grained data processing framework for heterogeneous IoT devices in sub-aquatic edge computing environment
HoepmanA critique of the google apple exposure notification (GAEN) framework
US20250086271A1 (en)Realtime identity attack detection and remediation
Wang et al.Protecting multi-party privacy in location-aware social point-of-interest recommendation
Krishnan et al.Risk and architecture factors in digital exposure notification
Vu-Minh et al.Performance Evaluation of Decentralized Machine Learning based Network-Based Intrusion Detection System for Internet of Things
US20250045434A1 (en)Secure contact tracing between computing devices
Park et al.Data privacy in wearable IoT devices: Anonymization and deanonymization
MouratidisStrong location privacy: A case study on shortest path queries
SharmaEthical challenges of big data in tourism
KhalfounPrivacy preserving location based services: From centralized to federated approaches
Ali et al.A Novel Privacy-Preserving Framework Based on Blockchain Technology to Secure Industrial IoT Data
US20240146749A1 (en)Threat relevancy based on user affinity
CN109726189A (en)One kind being based on the self-destructed cloud storage data processing method of data

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GAN, XIANG ZHEN;WANG, HAI HUI;LIU, GUANGYA;AND OTHERS;SIGNING DATES FROM 20230728 TO 20230731;REEL/FRAME:064438/0167

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION COUNTED, NOT YET MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp